CVE-2022-24312

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to write arbitrary files to the Schneider Electric Interactive Graphical SCADA System Data Server through path traversal. Successful exploitation could lead to remote code execution. Affects Data Server versions V15.0.0.22020 and earlier.

💻 Affected Systems

Products:
  • Interactive Graphical SCADA System Data Server
Versions: V15.0.0.22020 and prior
Operating Systems: Windows (SCADA systems typically run on Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations. SCADA systems are often in critical infrastructure environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise, SCADA control manipulation, and industrial process disruption.

🟠

Likely Case

File system manipulation allowing data corruption, denial of service, or privilege escalation leading to partial system control.

🟢

If Mitigated

Limited to file modification without execution if proper file permissions and integrity controls are in place.

🌐 Internet-Facing: HIGH - Exploitable remotely via specially crafted messages without authentication.
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability to gain control of critical SCADA systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI published advisory with technical details. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V15.0.0.22021 or later

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-01

Restart Required: Yes

Instructions:

1. Download patch from Schneider Electric portal. 2. Backup system. 3. Apply patch following vendor instructions. 4. Restart Data Server service. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SCADA Data Server from untrusted networks and internet

Access Control Lists

windows

Restrict network access to Data Server ports using firewall rules

netsh advfirewall firewall add rule name="Block SCADA Ports" dir=in action=block protocol=TCP localport=PORT_NUMBERS

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SCADA systems
  • Deploy application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Data Server version in application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Schneider Electric\IGSS\DataServer\Version

Check Version:

reg query "HKLM\SOFTWARE\Schneider Electric\IGSS\DataServer" /v Version

Verify Fix Applied:

Verify version is V15.0.0.22021 or later and test file write functionality is restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in Data Server logs
  • Failed path traversal attempts in application logs
  • Unexpected process creation from Data Server

Network Indicators:

  • Malformed messages to Data Server port
  • Unusual traffic patterns to SCADA systems

SIEM Query:

source="scada_server" AND (event="file_write" OR event="path_traversal")

🔗 References

📤 Share & Export